EP3251287B1 - Methods and arrangements for alert message detection in low latency systems - Google Patents

Methods and arrangements for alert message detection in low latency systems Download PDF

Info

Publication number
EP3251287B1
EP3251287B1 EP15704968.5A EP15704968A EP3251287B1 EP 3251287 B1 EP3251287 B1 EP 3251287B1 EP 15704968 A EP15704968 A EP 15704968A EP 3251287 B1 EP3251287 B1 EP 3251287B1
Authority
EP
European Patent Office
Prior art keywords
message
radio
network node
detection
messages
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP15704968.5A
Other languages
German (de)
French (fr)
Other versions
EP3251287A1 (en
Inventor
Bengt Lindoff
Shehzad Ali ASHRAF
Fredrik Lindqvist
Robert Baldemair
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Publication of EP3251287A1 publication Critical patent/EP3251287A1/en
Application granted granted Critical
Publication of EP3251287B1 publication Critical patent/EP3251287B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/185Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1895Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for short real-time information, e.g. alarms, notifications, alerts, updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/50Connection management for emergency connections
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/12Checking intermittently signalling or alarm systems
    • G08B29/123Checking intermittently signalling or alarm systems of line circuits

Definitions

  • the present disclosure relates to methods and devices in clustered alarm scenarios. More particularly the disclosure pertains to methods and arrangements for detecting several messages of a preconfigured message type, arriving sequentially in time.
  • LTE is a technology for realizing high-speed packet-based communication that can reach high data rates both in the downlink and in the uplink, and is thought of as a next generation mobile communication system relative to UMTS.
  • LTE allows for a system bandwidth of 20 MHz, or up to 100 MHz when carrier aggregation is employed.
  • LTE is also able to operate in different frequency bands and can operate in at least Frequency Division Duplex, FDD and Time Division Duplex, TDD, modes.
  • 5G i.e. 5th generation mobile networks
  • 5G the main task for 5G is to improve throughput and capacity compared to LTE. This is achieved by increasing the sample rate and bandwidth per carrier. 5G is also focusing on use of higher carrier frequencies i.e. above 5-10 GHz.
  • One main object of a 5G radio concept is to support highly reliable ultra-low delay Machine-Type Communication, MTC, i.e., Critical-MTC.
  • MTC Machine-Type Communication
  • the Critical-MTC concept should address the design trade-offs regarding e.g., end-to-end latency, transmission reliability, system capacity and deployment, and provide solutions for how to design a wireless network for different industrial-application use cases.
  • the Critical MTC system should in particular allow for radio resource management that allows the coexistence between different classes of applications: sporadic data, e.g., alert messages, periodic data, and others with e.g. real-time data (or simply best-effort data).
  • Alert messages e.g., alarms is probably one important type of messages that needs support for critical MTC application. Alarms are typically rare events. Hence, the alarm may be of Random Access type in some cases while in other cases, where we can assume that wireless device has reasonable sync to the network node, a scheduling request may be used.
  • alarms come in clusters. That means, once a sensor is transmitting an alarm it is likely that other sensors may transmit alarms almost at the same time or very short time after the first alarm.
  • a simple example of such type of alarm is the temperature/smoke alarm that could simultaneously trigger several closely spaced sensors. The alarms or alerts may come in the order of milliseconds, and then the network might not be able to detect the alarm message(s) with possible fatal problem/failure as a potential cause.
  • the system needs to be designed such that rare alarm events may be transmitted with very low latency and detected with high reliability.
  • Another approach is to use a high complexity detector algorithm, however using such an algorithm for monitoring rare events may imply that a lot of hardware capacity in the receiving network node, also referred to as message detector, is allocated to the complex detector algorithm instead of serving ordinary cellular traffic in the system, giving reduction in the system capacity, or increased cost for the hardware and/or software in the network node to maintain simultaneously high capacity system and high complexity detector.
  • the document US 2013/083648 A1 relates to a method of handling a collision event between a first and second transmission including detecting a collision event between the first and second transmissions while processing the first transmission at a receiver.
  • the method further includes halting decoding of the first transmission in response to detecting the collision, adjusting receive parameters to receive the second transmission, and detecting a preamble portion of the second transmission using the adjusted receive parameters.
  • the document EP 1 770 923 A2 relates to a method for initializing a wireless network which includes discovering at least one node of the wireless network that is within hearing range of a base station of the wireless network, authenticating the at least one discovered node, assigning a node identifier to the at least one discovered node, and selecting a network frequency, at least one backup frequency, and a locally unique network identifier.
  • Digital cellular telecommunications system Phase 2+; Universal Mobile Telecommunications System (UMTS); LTE; Service requirements for Machine-Type Communications (MTC); Stage 1 (3GPP TS 22.368 version 12.4.0 Release 12 ) may also be mentioned as a general background document.
  • An object of the present disclosure is to provide a radio network node which seeks to mitigate, alleviate, or eliminate one or more of the above-identified deficiencies in the art and disadvantages singly or in any combination.
  • a method performed in a radio network node, of detecting several messages of a preconfigured message type.
  • the method comprises detecting a first message of the preconfigured message type, the first message being associated with an event.
  • the method further comprises reconfiguring, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the preconfigured message type and monitoring a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
  • the message type is an alert message or an alarm message; and the reconfiguration involves switching from a first detection method to a second detection method, the second detection method providing, relative to the first detection method, an increased capability of detecting messages of the preconfigured message type by lowering a detection threshold, and/or enabling hardware to increase the detection sensitivity to messages of the preconfigured message type that are overlapping or affected by interference.
  • the method further comprises monitoring a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
  • the disclosure improves the alert message detection performance in scenarios, where multiple alarms may be triggered at approximately the same time.
  • the disclosure improves good trade-off between system capacity, network node complexity and reliability in the communication between the C-MTC devices transmitting the messages and network node is achieved.
  • the reconfiguring comprises reconfiguring at least one radio setting during a predefined time period after the detection of the first message.
  • the reconfiguring comprises enabling a capability to detect several messages of the preconfigured messages type that are at least partly overlapping in time.
  • the radio settings may be reconfigured such that overlapping messages may be received.
  • the reconfiguring comprises enabling or disabling one or more hardware units. Hence, overlapping messages or messages affected by interference are not missed. By adding processing or hardware resources, then the error rate may be kept the same.
  • the reconfiguring comprises monitoring additional radio resources. If the requests are sent on different channels in time and or frequency, there is no risk for collision.
  • the reconfiguring implies changing the false detection rate in the network node.
  • the reconfiguring comprises modifying a detection threshold in the radio network node. By lowering a detection threshold, the risk of missing data is reduced. This may be desirable if it is known that new messages are likely to occur within a certain time period. If a detection threshold is decreased, the false-detection rate typically increases.
  • the first message is a random access message. According to some aspects, the first message is a scheduling request.
  • the method further comprises the step of transmitting a response message to the sender of the first message.
  • the method further comprises the step of detecting a further message of the preconfigured message type.
  • the method further comprises the step of reverting to at least one of the radio settings used before detecting the first message. A while after the detection of the first message, the probability to receive further messages is decreased. Hence, the network node may then revert to the original settings in order to save (or free up) power or processing resources.
  • the disclosure relates to a computer program comprising computer program code which, when executed, causes a radio network node to execute the methods described above and below.
  • the disclosure relates a network node, in a wireless communication system.
  • the network node is configured to execute the methods described above.
  • FIG. 1a is illustrating embodiments of a network, where the proposed methods may be implemented.
  • four wireless devices 10a-10d here being sensors, monitor a first production line.
  • Each sensor is connected to or integrated with a modem that may communicate with an access point or base station.
  • the sensor devices are referred to as user equipments, UE, which is the term used by 3GPP standardization.
  • Figure 1b illustrates another example scenario.
  • the detectors are located in vicinity of each other, e.g. in a building. If one of the detectors gives an alarm due to e.g. a fire, there is then an increased probability that there will be more alarms in a near future.
  • the fire may affect all different kinds of sensors including battery, fire, temperature, smoke, software etc. Hence, at e.g. a fire, many alarms may occur in a very short time period.
  • Figure 2a is a time scheme illustrating how alarms from sensors are clustered in time.
  • Figure 2b illustrates that colliding alarms at time T2 are not correctly detected.
  • the same radio configuration or detection method M1 is used all the time. This configuration is typically power or resource efficient. However, the method cannot be used to detect several overlapping alarms.
  • one approach is to use a high complexity detector algorithm.
  • a lot of hardware capacity in the receiving network node also referred to as message detector, is allocated to the complex detector algorithm instead of serving ordinary traffic in the system, giving reduction in the system capacity, or increased cost for the hardware and/or software in the network node to maintain simultaneously high capacity system and high complexity detector.
  • the basic concept of the disclosure is to dynamically adapt or adjust the radio capabilities of an alert message detector 20 based on the likelihood of receiving alarms. This concept is using the fact that, in some scenarios, once a first alarm is detected the likelihood for alarms or alerts from other sensors are high, the alert message detector is adapted for improved performance. Then, the high performance detection mode is only used when there is a high probability to receive messages, wherein overall power consumption is reduced.
  • the detector algorithm is adapted to a more complex detector, for instance a detector capable of detecting multiple alert messages transmitted at the same frequency/time resources, here referred to as a joint detector.
  • more hardware resources e.g. processors, are allocated to the detector.
  • the adaptation of the detector is in a typical embodiment made during a pre-determined time period after a first alarm is detected. Hence, by enabling extra resources the risk of missing alarms may be reduced during certain time periods.
  • Figure 2c illustrates detecting colliding alarms using the proposed methods.
  • the detector uses a default detection method, M1. This method is typically quite power efficient, but not so efficient in terms of handling overlap and/or interference.
  • M2 detection method M2 is e.g. capable of detecting several simultaneous alarms. Hence, alarms overlapping in time, at T2, are correctly detected.
  • the alarm or alert message may be a message transmitted rather seldom. Hence, it may in some embodiments use random access channels and in other embodiments scheduling requests. However, the disclosure is not limited to these kinds of channels, but covers other channels with similar irregular occurrence, and where similar alert messages may be transmitted from associated sensors/modems etc. in a short time frame after a first sensor triggered an alert message.
  • Figures 3 and 4 comprises some operations and modules which are illustrated with a solid border and some operations which are illustrated with a dashed border.
  • the operations and modules which are illustrated with solid border are operations which are comprised in the broadest example embodiment.
  • the operations and modules which are illustrated with dashed border are example embodiments which may be comprised in, or a part of, or are further embodiments which may be taken in addition to the operations and modules of the broader example embodiments. It should be appreciated that the operations need not be performed in order.
  • FIG. 4 illustrates an example network node, configured for detecting several messages of a preconfigured message type.
  • the network node in this application also referred to as detector or alert message detector, is typically a radio network node or base station, such as an eNodeB in LTE.
  • the network node 20 comprises radio communication interface 21, a network communication interface 22 and processing circuitry 23.
  • the radio communication interface 21 is configured for communication with wireless devices within reach of the network node over a radio communication technology.
  • the radio communication interface 21 is adapted to receive messages of the predetermined message type, i.e. alarms or alert messages.
  • the network communication interface 22 is configured for communication with other network nodes. This communication is often wired e.g. using fiber. However, it may as well be wireless.
  • the connection between network nodes is generally referred to as the backhaul.
  • the controller, CTL, or processing circuitry 23 may be constituted by any suitable Central Processing Unit, CPU, microcontroller, Digital Signal Processor, DSP, etc. capable of executing computer program code.
  • the computer program may be stored in a memory, MEM 24.
  • the memory 24 can be any combination of a Read And write Memory, RAM, and a Read Only Memory, ROM.
  • the memory 24 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, or solid state memory or even remotely mounted memory.
  • the disclosure relates to a computer program comprising computer program code which, when executed, causes a radio network node to execute the methods described above and below.
  • the processing circuitry 23 is configured to perform the proposed methods of detecting several messages of a preconfigured message type. Hence, the processing circuitry 23 is configured to detect a first message of the preconfigured message type, the first message being associated with an event and to reconfigure, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the preconfigured message type. The processing circuitry 23 is further configured to monitor a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
  • an alert message detector 20 e.g. an eNodeB
  • the alert message detector is using a configuration referred to as a first detection method M1.
  • the monitoring is made using a first detection method M1.
  • the first detection method corresponds e.g. to a detector capable of only detecting a single alert message at a first frequency/time resource(s) or a detector with a first false alarm detection rate or a detector using a first set of hardware units.
  • the first detection method could also be a combination thereof.
  • the proposed method comprises in a first step S1, detecting a first message of the preconfigured message type, wherein the first message is associated with an event.
  • the message is received from a first wireless device.
  • the message is detected using the first detection method.
  • the message type is e.g. an alert message or alarm message.
  • PAM MTC Feature Priority Alarm Message
  • 3GPP 3GPP
  • the message is associated with an event implying e.g. that it is triggered or caused by an event.
  • An event is something that happens at a given place and time. An event may occur sporadically.
  • the event is e.g. a sensor alarm.
  • One example is an alarm from a sensor being triggered to send a message of a preconfigured message type under certain conditions.
  • Alarms triggered by sensors that are somehow related typically occur within a short time period as shown in figure 2a to 2c .
  • One example of related sensors is fire and/or smoke sensors in a building. Events may also be alarms or indications of software updates, low battery level or temperature increase or decrease.
  • the network node 20 may comprise a detector module 231 configured to detect the first message.
  • the method further comprises the step of transmitting S2 a response message to the sender of the first message.
  • the scheduler transmits an uplink, UL, grant to the sensor/device associated with the detected alert message.
  • the network node 20 may comprise a detector module 232 configured to transmit a response message.
  • the method comprises reconfiguring S3, in the radio network node, in response to the detection S1, at least one radio setting related to detecting further messages of the preconfigured message type.
  • the network node now adapts the alert message detection method and monitors the uplink for alert messages using a second detection method, M2.
  • the network node 20 may comprise a reconfiguration module 233 configured to reconfigure the radio settings.
  • the reconfiguring S3 comprises enabling a capability to detect several messages of the preconfigured messages type that are at least partly overlapping in time.
  • the second detection method comprises e.g. using a detector capable to detect multiple alert messages at a first frequency and/or time resource simultaneously, i.e. a joint detector.
  • the reconfiguring comprises enabling or disabling one or more hardware units such as processor units, receivers or receive antennas.
  • the reconfiguring comprises monitoring additional radio resources in time and/or frequency.
  • the reconfiguring implies changing the false detection rate in the network node.
  • This may be implemented by modifying a detection threshold in the radio network node.
  • the detection threshold is e.g. defined as a number of errors per message that are allowed, while still considering a message being correctly detected.
  • One example is using a detector with a second false alarm detection rate, which is higher than the first false alarm rate, but which detector is less likely to miss messages, even if they are partly or completely overlapping.
  • Another example is using a detector using a second set of hardware units which is larger than the first set.
  • the second detection method may detect messages of the preconfigured message type even if there is interference or overlap.
  • the method further comprises monitoring S4 a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
  • Using the reconfigured radio settings implies a decreased risk of missing messages of the preconfigured message type, because resources for e.g. simultaneous detection are introduced.
  • the network node 20 may comprise a monitoring module 234 configured to monitor a radio spectrum for further messages.
  • the method further comprises the step of detecting S5 a further message of the preconfigured message type.
  • the further message may be triggered by the same event as the first message or of a related message.
  • alarms are less likely to be missed.
  • every time a new alert message being a random access message or a request for uplink resources is detected uplink grants are transmitted to the sensors/devices associated with the detected alarm message.
  • the reconfiguring comprises reconfiguring at least one radio setting during a predefined time period after the detection of the first message. Then a timer is started, when the radio settings are reconfigured. This is in optional embodiments made until the timer is expired when the detector is adapted to the first detection method again.
  • the timer may be application specific but typically in the range of seconds to minutes even if the disclosure is not limited to such ranges.
  • the method further comprises the step of reverting S6 to at least one of the radio settings used before detecting the first message.
  • the functions or steps noted in the blocks can occur out of the order noted in the operational illustrations.
  • two blocks shown in succession can in fact be executed substantially concurrently or the blocks can sometimes be executed in the reverse order, depending upon the functionality/acts involved.
  • the functions or steps noted in the blocks can according to some aspects of the disclosure be executed continuously in a loop.
  • a cell is associated with a radio node, where a radio node or radio network node or eNodeB used interchangeably in the example embodiment description, comprises in a general sense any node transmitting radio signals used for measurements, e.g., eNodeB, macro/micro/pico base station, home eNodeB, relay, discovery signal device, access node/point, or repeater.
  • a radio network node herein may comprise a radio network node operating in one or more frequencies or frequency bands. It may be a radio network node capable of CA. It may also be a single- or multi-RAT node.
  • a multi-RAT node may comprise a node with co-located RATs or supporting multi-standard radio (MSR) or a mixed radio network node.
  • a computer-readable medium may include removable and non-removable storage devices including, but not limited to, Read Only Memory (ROM), Random Access Memory (RAM), compact discs (CDs), digital versatile discs (DVD), etc.
  • program modules may include routines, programs, objects, components, data structures, etc. that performs particular tasks or implement particular abstract data types.
  • Computer-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps or processes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

    TECHNICAL FIELD
  • The present disclosure relates to methods and devices in clustered alarm scenarios. More particularly the disclosure pertains to methods and arrangements for detecting several messages of a preconfigured message type, arriving sequentially in time.
  • BACKGROUND
  • The 3rd Generation Partnership Project, 3GPP, is responsible for the standardization of the Universal Mobile Telecommunication System, UMTS, and Long Term Evolution, LTE. The 3GPP work on LTE is also referred to as Evolved Universal Terrestrial Access Network, E-UTRAN. LTE is a technology for realizing high-speed packet-based communication that can reach high data rates both in the downlink and in the uplink, and is thought of as a next generation mobile communication system relative to UMTS. In order to support high data rates, LTE allows for a system bandwidth of 20 MHz, or up to 100 MHz when carrier aggregation is employed. LTE is also able to operate in different frequency bands and can operate in at least Frequency Division Duplex, FDD and Time Division Duplex, TDD, modes.
  • In 5G, i.e. 5th generation mobile networks, there will be evolvement of the current LTE system to 5G. The main task for 5G is to improve throughput and capacity compared to LTE. This is achieved by increasing the sample rate and bandwidth per carrier. 5G is also focusing on use of higher carrier frequencies i.e. above 5-10 GHz.
  • One main object of a 5G radio concept is to support highly reliable ultra-low delay Machine-Type Communication, MTC, i.e., Critical-MTC. The Critical-MTC concept should address the design trade-offs regarding e.g., end-to-end latency, transmission reliability, system capacity and deployment, and provide solutions for how to design a wireless network for different industrial-application use cases. The Critical MTC system should in particular allow for radio resource management that allows the coexistence between different classes of applications: sporadic data, e.g., alert messages, periodic data, and others with e.g. real-time data (or simply best-effort data).
  • One approach is to mix C-MTC applications with ordinary Mobile Broadband, MBB, traffic on the newly defined 5G. Hence, similar random access procedures as well as scheduling request procedures may be used for C-MTC applications as for MBB service, however with much tighter latency requirements/response times and/or reliability requirements.
  • Alert messages e.g., alarms is probably one important type of messages that needs support for critical MTC application. Alarms are typically rare events. Hence, the alarm may be of Random Access type in some cases while in other cases, where we can assume that wireless device has reasonable sync to the network node, a scheduling request may be used.
  • In many automation scenarios it might be likely that alarms come in clusters. That means, once a sensor is transmitting an alarm it is likely that other sensors may transmit alarms almost at the same time or very short time after the first alarm. A simple example of such type of alarm is the temperature/smoke alarm that could simultaneously trigger several closely spaced sensors. The alarms or alerts may come in the order of milliseconds, and then the network might not be able to detect the alarm message(s) with possible fatal problem/failure as a potential cause.
  • In any case, the system needs to be designed such that rare alarm events may be transmitted with very low latency and detected with high reliability.
  • One simple prior art solution for avoiding such risk for collisions is to allocate separate frequency/time resources for random access/scheduling request to all sensors sufficiently often in order to fulfill the latency requirements. However with that approach significantly amount of resources need to be pre-allocated that typically would not be used and hence very low system capacity is achieved.
  • Another approach is to use a high complexity detector algorithm, however using such an algorithm for monitoring rare events may imply that a lot of hardware capacity in the receiving network node, also referred to as message detector, is allocated to the complex detector algorithm instead of serving ordinary cellular traffic in the system, giving reduction in the system capacity, or increased cost for the hardware and/or software in the network node to maintain simultaneously high capacity system and high complexity detector.
  • The document US 5828300 A is considered the closest prior art. The preambles of the independent claims are based on this document. It discloses a self-testing data communications system suitable for use with an alarm system, the communications system being capable of modifying an operational parameter such as the input signal sensitivity of a receiver located at a monitoring station during receipt of a supervision signal from a remote alarm device, in order to ensure that a non-supervision alarm signal will be properly received when the operational parameter is again returned to its normal state. It does not concern clustered alarm situations.
  • The document US 2013/083648 A1 relates to a method of handling a collision event between a first and second transmission including detecting a collision event between the first and second transmissions while processing the first transmission at a receiver. The method further includes halting decoding of the first transmission in response to detecting the collision, adjusting receive parameters to receive the second transmission, and detecting a preamble portion of the second transmission using the adjusted receive parameters.
  • The document EP 1 770 923 A2 relates to a method for initializing a wireless network which includes discovering at least one node of the wireless network that is within hearing range of a base station of the wireless network, authenticating the at least one discovered node, assigning a node identifier to the at least one discovered node, and selecting a network frequency, at least one backup frequency, and a locally unique network identifier.
  • The 3GPP draft from ZTE, R2-102284, "RACH congestion evaluation and potential solutions" is a general backgound document and discloses several scenarios leading to RACH congestion and some high level proposals to address this problem, for example: Proposal 1: MTC scenarios where RA attempts cannot be uniformly spread in time should be considered and corresponding enhancements should be investigated.
  • "Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Service requirements for Machine-Type Communications (MTC); Stage 1 (3GPP TS 22.368 version 12.4.0 Release 12) may also be mentioned as a general background document.
  • However, it is desirable being able to handle clustered alarm situations in a good way such that the high reliability detection is maintained at the same time as an acceptable false alarm rate is achieved and complexity of the detector is maintained on an acceptable level.
  • SUMMARY
  • The invention is defined in the independent claims. Additional features of the invention are provided in the dependent claims.
  • An object of the present disclosure is to provide a radio network node which seeks to mitigate, alleviate, or eliminate one or more of the above-identified deficiencies in the art and disadvantages singly or in any combination.
  • This object is achieved by a method, performed in a radio network node, of detecting several messages of a preconfigured message type. The method comprises detecting a first message of the preconfigured message type, the first message being associated with an event. The method further comprises reconfiguring, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the preconfigured message type and monitoring a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
  • The message type is an alert message or an alarm message; and the reconfiguration involves switching from a first detection method to a second detection method, the second detection method providing, relative to the first detection method, an increased capability of detecting messages of the preconfigured message type by lowering a detection threshold, and/or enabling hardware to increase the detection sensitivity to messages of the preconfigured message type that are overlapping or affected by interference. The method further comprises monitoring a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
  • By using reconfigured settings, wherein the reconfiguration increases capability to detect e.g. overlapping messages or messages affected by interference, the risk of missing a further message of the preconfigured message type is avoided. Hence, the disclosure improves the alert message detection performance in scenarios, where multiple alarms may be triggered at approximately the same time. The disclosure improves good trade-off between system capacity, network node complexity and reliability in the communication between the C-MTC devices transmitting the messages and network node is achieved.
  • According to some aspects, the reconfiguring comprises reconfiguring at least one radio setting during a predefined time period after the detection of the first message. By changing the settings during a predefined time, messages received during times when it is a "high probability" to receive further messages, the risk of fault detection is reduced.
  • According to some aspects, the reconfiguring comprises enabling a capability to detect several messages of the preconfigured messages type that are at least partly overlapping in time. The radio settings may be reconfigured such that overlapping messages may be received. According to some aspects, the reconfiguring comprises enabling or disabling one or more hardware units. Hence, overlapping messages or messages affected by interference are not missed. By adding processing or hardware resources, then the error rate may be kept the same.
  • According to some aspects, the reconfiguring comprises monitoring additional radio resources. If the requests are sent on different channels in time and or frequency, there is no risk for collision.
  • According to some aspects, the reconfiguring implies changing the false detection rate in the network node. According to some aspects, the reconfiguring comprises modifying a detection threshold in the radio network node. By lowering a detection threshold, the risk of missing data is reduced. This may be desirable if it is known that new messages are likely to occur within a certain time period. If a detection threshold is decreased, the false-detection rate typically increases.
  • According to some aspects, the first message is a random access message. According to some aspects, the first message is a scheduling request.
  • According to some aspects, the method further comprises the step of transmitting a response message to the sender of the first message. According to some aspects, the method further comprises the step of detecting a further message of the preconfigured message type. According to some aspects, the method further comprises the step of reverting to at least one of the radio settings used before detecting the first message. A while after the detection of the first message, the probability to receive further messages is decreased. Hence, the network node may then revert to the original settings in order to save (or free up) power or processing resources.
  • According to some aspects, the disclosure relates to a computer program comprising computer program code which, when executed, causes a radio network node to execute the methods described above and below.
  • According to some aspects, the disclosure relates a network node, in a wireless communication system. The network node is configured to execute the methods described above.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing will be apparent from the following more particular description of the example embodiments, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the example embodiments.
    • Figure 1a is illustrating embodiments of one network, where the proposed methods may be implemented;
    • Figure 1b is illustrating embodiments of another network, where the proposed methods may be implemented;
    • Figure 2a illustrates clustered alarms in a time scheme;
    • Figure 2b illustrates that colliding alarms are not correctly detected;
    • Figure 2c illustrates detecting colliding alarms using the proposed methods;
    • Figure 3 is a flowchart illustrating embodiments of method steps in a network node;
    • Figure 4 is an example node configuration of a network node, according to some of the example embodiments;
    DETAILED DESCRIPTION
  • Aspects of the present disclosure will be described more fully hereinafter with reference to the accompanying drawings. The apparatus and method disclosed herein can, however, be realized in many different forms and should not be construed as being limited to the aspects set forth herein. Like numbers in the drawings refer to like elements throughout.
  • The terminology used herein is for the purpose of describing particular aspects of the disclosure only, and is not intended to limit the disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
  • Figure 1a is illustrating embodiments of a network, where the proposed methods may be implemented. In this example, four wireless devices 10a-10d, here being sensors, monitor a first production line. Each sensor is connected to or integrated with a modem that may communicate with an access point or base station. Hence, from a radio perspective the sensor devices are referred to as user equipments, UE, which is the term used by 3GPP standardization.
  • This is an example scenario. During a long time, e.g. min/hours/days, no alarms are reported. Suddenly at time T0 sensor 10a detects a problem, and sends an alarm e.g. including a scheduling request. The network node 20, here also referred to as an alert message detector, then needs to allocate uplink resources in order for the sensor to report the exact alarm message. However, due to cascading failures and/or problems in the production line, an adjacent sensor 10b triggers an alarm at time T1, and a third and a fourth sensor 10c, 10d at time T2. All these errors may come in the order of milliseconds, and as in the example above alarms from 10c and 10d collide and the network node might not be able to detect the alarm message(s) with possible fatal problem and/or failure as a potential cause.
  • Figure 1b illustrates another example scenario. In this example there are four fire/smoke detectors 10a' -10d'. The detectors are located in vicinity of each other, e.g. in a building. If one of the detectors gives an alarm due to e.g. a fire, there is then an increased probability that there will be more alarms in a near future. The fire may affect all different kinds of sensors including battery, fire, temperature, smoke, software etc. Hence, at e.g. a fire, many alarms may occur in a very short time period.
  • Figure 2a is a time scheme illustrating how alarms from sensors are clustered in time. Figure 2b illustrates that colliding alarms at time T2 are not correctly detected. In this method the same radio configuration or detection method M1 is used all the time. This configuration is typically power or resource efficient. However, the method cannot be used to detect several overlapping alarms.
  • As mentioned above, one approach is to use a high complexity detector algorithm. However using such an algorithm for monitoring rare events may imply that a lot of hardware capacity in the receiving network node, also referred to as message detector, is allocated to the complex detector algorithm instead of serving ordinary traffic in the system, giving reduction in the system capacity, or increased cost for the hardware and/or software in the network node to maintain simultaneously high capacity system and high complexity detector.
  • The basic concept of the disclosure is to dynamically adapt or adjust the radio capabilities of an alert message detector 20 based on the likelihood of receiving alarms. This concept is using the fact that, in some scenarios, once a first alarm is detected the likelihood for alarms or alerts from other sensors are high, the alert message detector is adapted for improved performance. Then, the high performance detection mode is only used when there is a high probability to receive messages, wherein overall power consumption is reduced.
  • In a first example, once a first alarm is reliable detected, the threshold for detection of alert messages are lowered increasing the reliability of detection at the price of also increasing the false alarm rate. In another example the detector algorithm is adapted to a more complex detector, for instance a detector capable of detecting multiple alert messages transmitted at the same frequency/time resources, here referred to as a joint detector. In yet another example more hardware resources e.g. processors, are allocated to the detector. The adaptation of the detector is in a typical embodiment made during a pre-determined time period after a first alarm is detected. Hence, by enabling extra resources the risk of missing alarms may be reduced during certain time periods.
  • Figure 2c illustrates detecting colliding alarms using the proposed methods. As in the example above, the detector uses a default detection method, M1. This method is typically quite power efficient, but not so efficient in terms of handling overlap and/or interference. In this example, once one alarm is detected, the settings of the message detector are reconfigured to detection method M2. Detection method M2 is e.g. capable of detecting several simultaneous alarms. Hence, alarms overlapping in time, at T2, are correctly detected.
  • In the description below we discuss alarm or alert messages and scheduler action made once an alarm is detected in the network node. The alarm or alert message may be a message transmitted rather seldom. Hence, it may in some embodiments use random access channels and in other embodiments scheduling requests. However, the disclosure is not limited to these kinds of channels, but covers other channels with similar irregular occurrence, and where similar alert messages may be transmitted from associated sensors/modems etc. in a short time frame after a first sensor triggered an alert message.
  • The proposed technique will now be described referring to Figure 3 illustrating example node operations in a network node and Figure 4 illustrating an example node configuration for performing these node operations.
  • It should be appreciated that Figures 3 and 4 comprises some operations and modules which are illustrated with a solid border and some operations which are illustrated with a dashed border. The operations and modules which are illustrated with solid border are operations which are comprised in the broadest example embodiment. The operations and modules which are illustrated with dashed border are example embodiments which may be comprised in, or a part of, or are further embodiments which may be taken in addition to the operations and modules of the broader example embodiments. It should be appreciated that the operations need not be performed in order.
  • Figure 4 illustrates an example network node, configured for detecting several messages of a preconfigured message type. The network node, in this application also referred to as detector or alert message detector, is typically a radio network node or base station, such as an eNodeB in LTE. The network node 20 comprises radio communication interface 21, a network communication interface 22 and processing circuitry 23.
  • The radio communication interface 21 is configured for communication with wireless devices within reach of the network node over a radio communication technology. In particular the radio communication interface 21 is adapted to receive messages of the predetermined message type, i.e. alarms or alert messages.
  • The network communication interface 22 is configured for communication with other network nodes. This communication is often wired e.g. using fiber. However, it may as well be wireless. The connection between network nodes is generally referred to as the backhaul.
  • The controller, CTL, or processing circuitry 23 may be constituted by any suitable Central Processing Unit, CPU, microcontroller, Digital Signal Processor, DSP, etc. capable of executing computer program code. The computer program may be stored in a memory, MEM 24. The memory 24 can be any combination of a Read And write Memory, RAM, and a Read Only Memory, ROM. The memory 24 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, or solid state memory or even remotely mounted memory.
  • According to some aspects, the disclosure relates to a computer program comprising computer program code which, when executed, causes a radio network node to execute the methods described above and below.
  • The processing circuitry 23 is configured to perform the proposed methods of detecting several messages of a preconfigured message type. Hence, the processing circuitry 23 is configured to detect a first message of the preconfigured message type, the first message being associated with an event and to reconfigure, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the preconfigured message type. The processing circuitry 23 is further configured to monitor a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
  • The proposed methods performed in a network node 20, here referred to as an alert message detector, will now be described in more detail referring to Figure 3. It should be appreciated that the example operations of Figure 3 may be performed simultaneously for any number of radio network nodes in the wireless communications network.
  • We refer back to the scenarios in figure 1. Hence, an alert message detector 20, e.g. an eNodeB, is monitoring the uplink, UL, for alert messages. The alert message detector is using a configuration referred to as a first detection method M1. Hence, the monitoring is made using a first detection method M1. The first detection method corresponds e.g. to a detector capable of only detecting a single alert message at a first frequency/time resource(s) or a detector with a first false alarm detection rate or a detector using a first set of hardware units. The first detection method could also be a combination thereof.
  • The proposed method comprises in a first step S1, detecting a first message of the preconfigured message type, wherein the first message is associated with an event. The message is received from a first wireless device. The message is detected using the first detection method. The message type is e.g. an alert message or alarm message. One example would be a MTC Feature Priority Alarm Message, PAM, defined in 3GPP, which is intended for use with MTC Devices that issue a priority alarm in the event of e.g. theft, vandalism or other needs for immediate attention. However, there may also be other message types defined.
  • The message is associated with an event implying e.g. that it is triggered or caused by an event. An event is something that happens at a given place and time. An event may occur sporadically. The event is e.g. a sensor alarm. One example is an alarm from a sensor being triggered to send a message of a preconfigured message type under certain conditions. Alarms triggered by sensors that are somehow related (e.g. located in vicinity) typically occur within a short time period as shown in figure 2a to 2c. One example of related sensors is fire and/or smoke sensors in a building. Events may also be alarms or indications of software updates, low battery level or temperature increase or decrease.
  • A sensor that triggers an alarm typically needs uplink resources for sending further information about the event. Hence, the first message is e.g. a random access message or a scheduling request on an uplink control channel as discussed above. The network node 20 may comprise a detector module 231 configured to detect the first message.
  • According to some aspects, the method further comprises the step of transmitting S2 a response message to the sender of the first message. Once an alert message being a random access message or a request for uplink resources has been detected the scheduler transmits an uplink, UL, grant to the sensor/device associated with the detected alert message. The network node 20 may comprise a detector module 232 configured to transmit a response message.
  • In a next step the method comprises reconfiguring S3, in the radio network node, in response to the detection S1, at least one radio setting related to detecting further messages of the preconfigured message type. Hence, the network node now adapts the alert message detection method and monitors the uplink for alert messages using a second detection method, M2. The network node 20 may comprise a reconfiguration module 233 configured to reconfigure the radio settings.
  • According to some aspects, the reconfiguring S3 comprises enabling a capability to detect several messages of the preconfigured messages type that are at least partly overlapping in time. Thus, the second detection method comprises e.g. using a detector capable to detect multiple alert messages at a first frequency and/or time resource simultaneously, i.e. a joint detector. According to some aspects, the reconfiguring comprises enabling or disabling one or more hardware units such as processor units, receivers or receive antennas.
  • According to some aspects, the reconfiguring comprises monitoring additional radio resources in time and/or frequency.
  • According to some aspects, the reconfiguring implies changing the false detection rate in the network node. This may be implemented by modifying a detection threshold in the radio network node. The detection threshold is e.g. defined as a number of errors per message that are allowed, while still considering a message being correctly detected. One example is using a detector with a second false alarm detection rate, which is higher than the first false alarm rate, but which detector is less likely to miss messages, even if they are partly or completely overlapping. Another example is using a detector using a second set of hardware units which is larger than the first set. Hence, the second detection method may detect messages of the preconfigured message type even if there is interference or overlap.
  • The method further comprises monitoring S4 a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings. Using the reconfigured radio settings implies a decreased risk of missing messages of the preconfigured message type, because resources for e.g. simultaneous detection are introduced. The network node 20 may comprise a monitoring module 234 configured to monitor a radio spectrum for further messages.
  • According to some aspects, the method further comprises the step of detecting S5 a further message of the preconfigured message type. The further message may be triggered by the same event as the first message or of a related message. However, by using the reconfigured radio settings, alarms are less likely to be missed. Thus, with the proposed technique, every time a new alert message being a random access message or a request for uplink resources is detected uplink grants are transmitted to the sensors/devices associated with the detected alarm message.
  • According to some aspects, the reconfiguring comprises reconfiguring at least one radio setting during a predefined time period after the detection of the first message. Then a timer is started, when the radio settings are reconfigured. This is in optional embodiments made until the timer is expired when the detector is adapted to the first detection method again. The timer may be application specific but typically in the range of seconds to minutes even if the disclosure is not limited to such ranges. Hence, according to some aspects, the method further comprises the step of reverting S6 to at least one of the radio settings used before detecting the first message.
  • Aspects of the disclosure are described with reference to the drawings, e.g., block diagrams and/or flowcharts. It is understood that several entities in the drawings, e.g., blocks of the block diagrams, and also combinations of entities in the drawings, can be implemented by computer program instructions, which instructions can be stored in a computer-readable memory, and also loaded onto a computer or other programmable data processing apparatus. Such computer program instructions can be provided to a processor of a general purpose computer, a special purpose computer and/or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
  • In some implementations and according to some aspects of the disclosure, the functions or steps noted in the blocks can occur out of the order noted in the operational illustrations. For example, two blocks shown in succession can in fact be executed substantially concurrently or the blocks can sometimes be executed in the reverse order, depending upon the functionality/acts involved. Also, the functions or steps noted in the blocks can according to some aspects of the disclosure be executed continuously in a loop.
  • In the drawings and specification, there have been disclosed exemplary aspects of the disclosure. However, many variations and modifications can be made to these aspects without substantially departing from the principles of the present disclosure. Thus, the disclosure should be regarded as illustrative rather than restrictive, and not as being limited to the particular aspects discussed above. Accordingly, although specific terms are employed, they are used in a generic and descriptive sense only and not for purposes of limitation.
  • It should be noted that although terminology from 3GPP LTE has been used herein to explain the example embodiments, this should not be seen as limiting the scope of the example embodiments to only the aforementioned system. Other wireless systems, including WCDMA, WiMax, UMB, GSM, WLAN, and Bluetooth may also benefit from the example embodiments disclosed herein.
  • The description of the example embodiments provided herein have been presented for purposes of illustration. The description is not intended to be exhaustive or to limit example embodiments to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of various alternatives to the provided embodiments. The examples discussed herein were chosen and described in order to explain the principles and the nature of various example embodiments and its practical application to enable one skilled in the art to utilize the example embodiments in various manners and with various modifications as are suited to the particular use contemplated. The features of the embodiments described herein may be combined in all possible combinations of methods, apparatus, modules, systems, and computer program products. It should be appreciated that the example embodiments presented herein may be practiced in any combination with each other.
  • It should be noted that the word "comprising" does not necessarily exclude the presence of other elements or steps than those listed and the words "a" or "an" preceding an element do not exclude the presence of a plurality of such elements. It should further be noted that any reference signs do not limit the scope of the claims, that the example embodiments may be implemented at least in part by means of both hardware and software, and that several "means", "units" or "devices" may be represented by the same item of hardware.
  • A cell is associated with a radio node, where a radio node or radio network node or eNodeB used interchangeably in the example embodiment description, comprises in a general sense any node transmitting radio signals used for measurements, e.g., eNodeB, macro/micro/pico base station, home eNodeB, relay, discovery signal device, access node/point, or repeater. A radio network node herein may comprise a radio network node operating in one or more frequencies or frequency bands. It may be a radio network node capable of CA. It may also be a single- or multi-RAT node. A multi-RAT node may comprise a node with co-located RATs or supporting multi-standard radio (MSR) or a mixed radio network node.
  • The various example embodiments described herein are described in the general context of method steps or processes, which may be implemented in one aspect by a computer program product, embodied in a computer-readable medium, including computer-executable instructions, such as program code, executed by computers in networked environments. A computer-readable medium may include removable and non-removable storage devices including, but not limited to, Read Only Memory (ROM), Random Access Memory (RAM), compact discs (CDs), digital versatile discs (DVD), etc. Generally, program modules may include routines, programs, objects, components, data structures, etc. that performs particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps or processes.
  • In the drawings and specification, there have been disclosed exemplary embodiments. However, many variations and modifications can be made to these embodiments. Accordingly, although specific terms are employed, they are used in a generic and descriptive sense only and not for purposes of limitation, the scope of the embodiments being defined by the following claims.

Claims (17)

  1. A method, performed in a radio network node (20), of detecting several messages of a preconfigured message type, the method comprising:
    - detecting (S1) a first message of the preconfigured message type, the first message being associated with an event; and
    - reconfiguring (S3), in the radio network node, in response to the detection (S1), at least one radio setting related to detecting further messages of the preconfigured message type, characterized by:
    the message type being an alert message or an alarm message; and
    the reconfiguration involving switching from a first detection method (M1) to a second detection method (M2), the second detection method providing, relative to the first detection method, an increased capability of detecting messages of the preconfigured message type by lowering a detection threshold, and/or enabling hardware to increase the detection sensitivity to messages of the preconfigured message type that are overlapping or affected by interference; and
    - monitoring (S4) a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
  2. The method of any preceding claim, wherein the monitoring (S4) comprises using the at least one reconfigured radio setting during a predefined time period after the detection of the first message.
  3. The method of any preceding claim, wherein the reconfiguring comprises enabling a capability to detect several messages of the preconfigured message type that are at least partly overlapping in time.
  4. The method of any preceding claim, wherein the reconfiguring comprises enabling or disabling one or more hardware units.
  5. The method of claim 4, wherein the reconfiguring comprises enabling more receiver branches/antennas.
  6. The method of any preceding claim, wherein the reconfiguring comprises monitoring additional radio resources.
  7. The method of any preceding claim, wherein the reconfiguring implies changing the false detection rate in the radio network node.
  8. The method of claim 7, wherein the reconfiguring comprises modifying a detection threshold in the radio network node.
  9. The method of any preceding claim, wherein first message is a random access message.
  10. The method of any preceding claim, wherein first message is a scheduling request.
  11. The method of any preceding claim further comprising the step of:
    - transmitting (S2) a response message to the sender of the first message.
  12. The method of any preceding claim further comprising the step of:
    - detecting (S5) a further message of the preconfigured message type using the at least one reconfigured radio setting.
  13. The method of any preceding claim further comprising the step of:
    - reverting (S6) to at least one of the radio settings used before detecting the first message.
  14. The method of any preceding claim, wherein the first detection method (M1) is the default detection method, and is more power efficient or less complex than the second detection method (M2).
  15. A computer program comprising computer program code which, when executed, causes a radio network node to execute all the steps of the method according to any of the claims 1-14.
  16. A radio network node (20), in a communication system, the radio network node being configured for detecting several messages of a preconfigured message type, the radio network node (20) comprising :
    - a radio communication interface (21);
    - a network communication interface (22) configured for communication with other radio network nodes, and
    - processing circuitry (23) configured to cause the radio network node (20):
    • to detect a first message of the preconfigured message type, the first message being associated with an event;
    • to reconfigure, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the same preconfigured message type; characterized by:
    • the message type being an alert message or an alarm message; and the reconfiguration involving switching from a first detection method (M1) to a second detection method (M2), the second detection method providing, relative to the first detection method, an increased capability of detecting messages of the preconfigured message type by lowering a detection threshold, and/or enabling hardware to increase the detection sensitivity to messages of the preconfigured message type that are overlapping or affected by interference;
    and
    • to monitor a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
  17. The radio network node (20) of claim 16, wherein the processing circuitry (23) is further configured to cause the radio network node (20) to perform any of the steps as defined in claims 2-14.
EP15704968.5A 2015-01-30 2015-01-30 Methods and arrangements for alert message detection in low latency systems Active EP3251287B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2015/051972 WO2016119893A1 (en) 2015-01-30 2015-01-30 Methods and arrangements for alert message detection in low latency systems

Publications (2)

Publication Number Publication Date
EP3251287A1 EP3251287A1 (en) 2017-12-06
EP3251287B1 true EP3251287B1 (en) 2020-03-04

Family

ID=52477773

Family Applications (1)

Application Number Title Priority Date Filing Date
EP15704968.5A Active EP3251287B1 (en) 2015-01-30 2015-01-30 Methods and arrangements for alert message detection in low latency systems

Country Status (4)

Country Link
US (1) US10297142B2 (en)
EP (1) EP3251287B1 (en)
CN (1) CN107210922B (en)
WO (1) WO2016119893A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110687254B (en) 2019-10-14 2021-11-05 浙江大华技术股份有限公司 Method and system for determining diffusion trend of diffusible object
US11610391B2 (en) 2019-12-30 2023-03-21 Industrial Technology Research Institute Cross-domain image comparison method and system using semantic segmentation
EP3885926A1 (en) * 2020-03-25 2021-09-29 Carrier Corporation Fire protection system

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6087933A (en) * 1996-05-20 2000-07-11 Pittway Corporation Antenna switching for amplitude degradation during supervision and installation of wireless security systems
US5828300A (en) * 1996-05-20 1998-10-27 Pittway Corporation Alarm system with supervision controlled receiver parameter modification
EP1296276A1 (en) * 2001-09-21 2003-03-26 EM Microelectronic-Marin SA Method of controlling the receiver of a long distance communication transponder
US7091827B2 (en) * 2003-02-03 2006-08-15 Ingrid, Inc. Communications control in a security system
US7831282B2 (en) * 2003-10-15 2010-11-09 Eaton Corporation Wireless node providing improved battery power consumption and system employing the same
US7426190B2 (en) 2005-09-30 2008-09-16 Robert Bosch Gmbh System and method for a communication protocol for wireless sensor systems including systems with high priority asynchronous message and low priority synchronous message
US8260249B2 (en) * 2007-09-17 2012-09-04 Qualcomm Incorporated Method and apparatus of power control for a public warning system
CN102223688B (en) * 2010-04-16 2016-04-13 中兴通讯股份有限公司 A kind of method and system processing the preferential alert message of MTC
WO2011136508A2 (en) * 2010-04-27 2011-11-03 Ajou University Industry-Academic Cooperation Foundation Random access method and apparatus in wireless communication system
CN102256218A (en) * 2010-05-21 2011-11-23 电信科学技术研究院 Transmission method and device for preferential warning message in machine type communication
CN102413448B (en) * 2010-09-25 2016-06-08 中兴通讯股份有限公司 MTC device sends carrying establishing method and the system of preferential alarm data
JP5569322B2 (en) * 2010-10-07 2014-08-13 ソニー株式会社 Wireless terminal, wireless communication method, and wireless communication system
US9013975B2 (en) * 2011-09-30 2015-04-21 Silicon Laboratories Inc. Receiver with collision detection and method therefor
JP6112116B2 (en) * 2012-02-17 2017-04-12 日本電気株式会社 Method for controlling machine type communication (MTC) in a wireless communication network
US8909267B2 (en) * 2012-04-19 2014-12-09 Telefonaktiebolaget L M Ericsson (Publ) Energy-efficient detection of network connection requests

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
US10297142B2 (en) 2019-05-21
EP3251287A1 (en) 2017-12-06
CN107210922B (en) 2020-09-25
CN107210922A (en) 2017-09-26
US20180025622A1 (en) 2018-01-25
WO2016119893A1 (en) 2016-08-04

Similar Documents

Publication Publication Date Title
US9578645B2 (en) Reducing congestion in wireless communication networks
JP6440720B2 (en) D2D communication method and apparatus
EP2719242B1 (en) Unscheduled messages
JP6196373B2 (en) System information signaling to MTC device
US10177898B2 (en) Methods for signal detection in a system with sparse synchronization signal rate
EP3251287B1 (en) Methods and arrangements for alert message detection in low latency systems
EP2839710A2 (en) Method and communication device for controlling access to a wireless access network
EP4305914A1 (en) Techniques for dual active subscriber transmit sharing
EP4059270B1 (en) Always-on short messages
WO2020143827A1 (en) Method and apparatus for transmitting control information
WO2021051219A1 (en) Techniques for prioritizing manually search public land mobile network
CN113383604A (en) Timer configuration for new radio unlicensed and new radio shared spectrum
US20180027448A1 (en) Methods and Arrangements for Enabling Uplink Radio Access in Clustered Alarm Scenarios
US11832137B2 (en) Techniques for discontinuous reception collision handling for multiple subscriber identity module user equipment
US11758606B2 (en) Suspension of beam or link recovery for a failure event
EP4211982A1 (en) Techniques for discontinuous reception collision resolution for multi-sim user equipment
US11950251B2 (en) Configured grant based physical uplink shared channel transmission with associated scheduling request
WO2021217387A1 (en) Recovery from repeated network configuration failure
EP4124140A1 (en) User equipment and base station involved in transmission of small data
US20230179337A1 (en) Hybrid automatic repeat request (harq) feedback operation with sidelink unlicensed
WO2021067817A1 (en) Dynamic indication of physical downlink control channel monitoring location
WO2022192905A1 (en) Techniques for dual active subscriber transmit sharing
WO2023156124A1 (en) Suspending random-access procedure
EP4176525A2 (en) Beam failure detection and recovery with carrier aggregation
WO2020205242A1 (en) Reporting uplink control information in a random access procedure

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20170821

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20180828

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 12/18 20060101AFI20191014BHEP

Ipc: H04W 76/50 20180101ALI20191014BHEP

Ipc: G08B 29/12 20060101ALN20191014BHEP

INTG Intention to grant announced

Effective date: 20191120

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 12/18 20060101AFI20191111BHEP

Ipc: H04W 76/50 20180101ALI20191111BHEP

Ipc: G08B 29/12 20060101ALN20191111BHEP

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

RIN1 Information on inventor provided before grant (corrected)

Inventor name: ASHRAF, SHEHZAD, ALI

Inventor name: BALDEMAIR, ROBERT

Inventor name: LINDOFF, BENGT

Inventor name: LINDQVIST, FREDRIK

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1241660

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200315

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602015048100

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200604

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20200304

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200605

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200604

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200704

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200729

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1241660

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200304

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602015048100

Country of ref document: DE

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

26N No opposition filed

Effective date: 20201207

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210130

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20210131

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210131

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210131

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210131

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20230125

Year of fee payment: 9

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230127

Year of fee payment: 9

Ref country code: DE

Payment date: 20230127

Year of fee payment: 9

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230523

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20150130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304